Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Open WebUI File Upload Vulnerability Allows 1 Leads Attack
May 12, 2026
SAP Patches Critical SQL Injection Flaw in S/4 Vulnerability S/4HANA
May 12, 2026
Zoom Rooms Vulnerabilities Allow Attackers to Escalate
May 12, 2026
Home/Threats/MuddyWater APT Delivers RustyWater via Word, Ev Weaponizing Documents
Threats

MuddyWater APT Delivers RustyWater via Word, Ev Weaponizing Documents

The Iran-linked MuddyWater Advanced Persistent Threat group has launched a sophisticated spear-phishing campaign targeting diplomatic, maritime, financial, and telecom sectors across the Middle East....

Emy Elsamnoudy
Emy Elsamnoudy
January 9, 2026 2 Min Read
7 0

The Iran-linked MuddyWater Advanced Persistent Threat group has launched a sophisticated spear-phishing campaign targeting diplomatic, maritime, financial, and telecom sectors across the Middle East.

The threat actors are using weaponized Word documents to deliver a new Rust-based malware called RustyWater, which represents a major change from their traditional PowerShell and VBS tooling.

This upgraded implant can bypass antivirus and endpoint detection and response tools through multiple evasion techniques.

The attack begins with emails pretending to be official communications from legitimate organizations.

These emails contain malicious Word documents disguised as cybersecurity guidelines or policy documents. When victims enable macros, the hidden VBA code activates and starts the infection process.

CloudSEK researchers identified this campaign after detecting unusual patterns in threat activity across Middle Eastern organizations.

The malicious document contains two VBA macro functions that work together to deploy the payload. The WriteHexToFile function extracts hex-encoded data hidden inside a UserForm control, converts it to binary format, and saves it as CertificationKit.ini in the ProgramData folder.

The second function, called love_me_, uses ASCII value obfuscation to build command strings dynamically.

It reconstructs WScript.Shell through character codes and executes the dropped payload using cmd.exe. This approach helps the malware avoid static signature detection by security tools.

Multi-Layer Evasion and Persistence Mechanisms

RustyWater establishes persistence by adding itself to the Windows Registry startup key. The malware first checks the current user’s Run registry location and creates an entry pointing to CertificationKit.ini so it automatically runs when the system starts.

Kill Chain (Source - CloudSEK)
Kill Chain (Source – CloudSEK)

The implant uses position-independent XOR encryption to hide all its strings, making analysis more difficult.

Before executing its main functions, RustyWater scans the system for more than 25 antivirus and EDR products by checking service names, agent files, and installation paths. When it detects security tools, it changes its behavior to stay hidden.

UAE MOFA Decoy (Source - CloudSEK)
UAE MOFA Decoy (Source – CloudSEK)

The malware collects victim information including username, computer name, and domain details.

It packages this data in JSON format, then applies base64 encoding and XOR encryption in three layers before sending it to command and control servers.

RustyWater uses the Rust reqwest library for HTTP communication with built-in timeouts, connection pooling, and retry logic. The implant creates random sleep intervals between communications to make network traffic patterns harder to analyze.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityMalwarephishingSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Ransomware & Initial Access Fuel Australia/NZ Cyber Threats

Next Post

Sophisticated Phishing Steals Fortinet VPN Credentials

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Hijack Microsoft Teams to Deliver ModeloRAT
May 12, 2026
North Korean Hackers Weaponize Git Hooks to Deploy Cross-Platform
May 12, 2026
Critical Cline AI Agent Vulnerability Allows RCE Attacks
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us